Skip to content

chore(deps): bump hono from 4.12.4 to 4.12.16#93

Closed
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/hono-4.12.16
Closed

chore(deps): bump hono from 4.12.4 to 4.12.16#93
dependabot[bot] wants to merge 1 commit into
mainfrom
dependabot/npm_and_yarn/hono-4.12.16

Conversation

@dependabot
Copy link
Copy Markdown
Contributor

@dependabot dependabot Bot commented on behalf of github May 8, 2026

Bumps hono from 4.12.4 to 4.12.16.

Release notes

Sourced from hono's releases.

v4.12.16

Security fixes

This release includes fixes for the following security issues:

Unvalidated JSX Tag Names in hono/jsx May Allow HTML Injection

Affects: hono/jsx. Fixes missing validation of JSX tag names when using jsx() or createElement(), which could allow HTML injection if untrusted input is used as the tag name. GHSA-69xw-7hcm-h432

bodyLimit() can be bypassed for chunked / unknown-length requests

Affects: Body Limit Middleware. Fixes late enforcement for request bodies without a reliable Content-Length (e.g. chunked requests), where oversized requests could reach handlers and return successful responses before being rejected. GHSA-9vqf-7f2p-gf9v

v4.12.15

What's Changed

New Contributors

Full Changelog: honojs/hono@v4.12.14...v4.12.15

v4.12.14

Security fixes

This release includes fixes for the following security issues:

Improper handling of JSX attribute names in hono/jsx SSR

Affects: hono/jsx. Fixes missing validation of JSX attribute names during server-side rendering, which could allow malformed attribute keys to corrupt the generated HTML output and inject unintended attributes or elements. GHSA-458j-xx4x-4375

Other changes

  • fix(aws-lambda): handle invalid header names in request processing (#4883) fa2c74fe

v4.12.13

What's Changed

New Contributors

Full Changelog: honojs/hono@v4.12.12...v4.12.13

v4.12.12

Security fixes

This release includes fixes for the following security issues:

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Greptile Summary

This PR bumps hono from 4.12.4 to 4.12.16 across two package manifests and regenerates the lockfile. The upgrade resolves three security advisories (HTML injection via unvalidated JSX tag names GHSA-69xw-7hcm-h432, bodyLimit() bypass for chunked requests GHSA-9vqf-7f2p-gf9v, and JSX attribute name injection GHSA-458j-xx4x-4375).

  • hono bump: Both apps/examples/hono-example/package.json and packages/hono/package.json move from 4.12.4 to 4.12.16; the lockfile is updated accordingly with the new resolution integrity hash.
  • Lockfile collateral changes: The lockfile regeneration also surfaces newly deprecated entries for @ungap/structured-clone@1.3.0 (CWE-502), uuid@8.3.2, and glob@10.4.5, and bumps several indirect dependencies (graphql, tough-cookie, tldts, type-fest, turbo).

Confidence Score: 5/5

Safe to merge — the change is a pure security patch bump with no API-breaking changes within the 4.12.x line.

The hono upgrade is patch-range only (4.12.4 → 4.12.16) and resolves three disclosed security advisories. The lockfile collateral changes (graphql, tough-cookie, tldts, turbo) are all minor/patch bumps without breaking changes. The @ungap/structured-clone CWE-502 notice is a pre-existing transitive dependency issue surfaced by the lockfile regeneration, not a regression introduced here.

No files require special attention; the lockfile's newly surfaced @ungap/structured-clone@1.3.0 deprecation is worth a follow-up in a separate PR.

Security Review

  • GHSA-69xw-7hcm-h432 (hono/jsx): Missing validation of JSX tag names in jsx()/createElement() allowed HTML injection — fixed in this update.
  • GHSA-9vqf-7f2p-gf9v (bodyLimit middleware): Chunked / unknown-length requests could bypass the body size limit and reach handlers — fixed in this update.
  • GHSA-458j-xx4x-4375 (hono/jsx SSR): Missing validation of JSX attribute names during SSR could corrupt generated HTML and inject attributes/elements — fixed in this update.
  • CWE-502 (@ungap/structured-clone@1.3.0): Deserialization vulnerability surfaced as a deprecated notice in the regenerated lockfile; not introduced by this PR but warrants a follow-up upgrade to ≥1.3.1.

Important Files Changed

Filename Overview
apps/examples/hono-example/package.json Bumps hono dependency from 4.12.4 to 4.12.16; no other changes.
packages/hono/package.json Bumps hono devDependency from 4.12.4 to 4.12.16; no other changes.
pnpm-lock.yaml Lockfile regenerated: hono updated, plus indirect bumps for turbo, graphql, tough-cookie, tldts, type-fest. Newly surfaces deprecated entries for @ungap/structured-clone@1.3.0 (CWE-502), uuid@8.3.2, and glob@10.4.5 that warrant separate follow-up.

Flowchart

%%{init: {'theme': 'neutral'}}%%
flowchart TD
    A[hono 4.12.4] -->|bump| B[hono 4.12.16]
    B --> C[Security Fix: GHSA-69xw-7hcm-h432\nJSX tag name injection]
    B --> D[Security Fix: GHSA-9vqf-7f2p-gf9v\nbodyLimit bypass for chunked requests]
    B --> E[Security Fix: GHSA-458j-xx4x-4375\nJSX attribute name injection]
    B --> F[Other fixes: JWT single-line PEM,\nmethod-override charset, type improvements]
    G[pnpm-lock.yaml regeneration] --> H[Indirect dep bumps:\ngraphql, tough-cookie, tldts,\ntype-fest, turbo]
    G --> I[Deprecated packages surfaced:\n@ungap/structured-clone 1.3.0 CWE-502\nuuid@8.3.2\nglob@10.4.5]
Loading
Prompt To Fix All With AI
Fix the following 1 code review issue. Work through them one at a time, proposing concise fixes.

---

### Issue 1 of 1
pnpm-lock.yaml:3152
**Deprecated transitive dependency with deserialization vulnerability**

The lockfile regeneration surfaces `@ungap/structured-clone@1.3.0` as deprecated with a `Potential CWE-502` notice. CWE-502 (Deserialization of Untrusted Data) can allow remote code execution if attacker-controlled data passes through the `structuredClone` polyfill. While this is a transitive dependency and not directly introduced by this PR, it is now explicitly flagged. A follow-up PR should identify which package pulls it in and upgrade to `@ungap/structured-clone@1.3.1` or higher to clear the advisory.

Reviews (1): Last reviewed commit: "chore(deps): bump hono from 4.12.4 to 4...." | Re-trigger Greptile

Greptile also left 1 inline comment on this PR.

Bumps [hono](https://github.com/honojs/hono) from 4.12.4 to 4.12.16.
- [Release notes](https://github.com/honojs/hono/releases)
- [Commits](honojs/hono@v4.12.4...v4.12.16)

---
updated-dependencies:
- dependency-name: hono
  dependency-version: 4.12.16
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels May 8, 2026
@dependabot dependabot Bot requested a review from endalk200 as a code owner May 8, 2026 12:12
@dependabot dependabot Bot added dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code labels May 8, 2026
@vercel
Copy link
Copy Markdown

vercel Bot commented May 8, 2026

The latest updates on your projects. Learn more about Vercel for GitHub.

Project Deployment Actions Updated (UTC)
better-webhook-docs Error Error May 8, 2026 0:12am

Comment thread pnpm-lock.yaml

'@ungap/structured-clone@1.3.0':
resolution: {integrity: sha512-WmoN8qaIAo7WTYWbAZuG8PYEhn5fkz7dZrqTBZ7dtt//lL2Gwms1IcnQ5yHqjDfX8Ft5j4YzDM23f87zBfDe9g==}
deprecated: Potential CWE-502 - Update to 1.3.1 or higher
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P2 security Deprecated transitive dependency with deserialization vulnerability

The lockfile regeneration surfaces @ungap/structured-clone@1.3.0 as deprecated with a Potential CWE-502 notice. CWE-502 (Deserialization of Untrusted Data) can allow remote code execution if attacker-controlled data passes through the structuredClone polyfill. While this is a transitive dependency and not directly introduced by this PR, it is now explicitly flagged. A follow-up PR should identify which package pulls it in and upgrade to @ungap/structured-clone@1.3.1 or higher to clear the advisory.

Prompt To Fix With AI
This is a comment left during a code review.
Path: pnpm-lock.yaml
Line: 3152

Comment:
**Deprecated transitive dependency with deserialization vulnerability**

The lockfile regeneration surfaces `@ungap/structured-clone@1.3.0` as deprecated with a `Potential CWE-502` notice. CWE-502 (Deserialization of Untrusted Data) can allow remote code execution if attacker-controlled data passes through the `structuredClone` polyfill. While this is a transitive dependency and not directly introduced by this PR, it is now explicitly flagged. A follow-up PR should identify which package pulls it in and upgrade to `@ungap/structured-clone@1.3.1` or higher to clear the advisory.

How can I resolve this? If you propose a fix, please make it concise.

@dependabot @github
Copy link
Copy Markdown
Contributor Author

dependabot Bot commented on behalf of github May 9, 2026

Superseded by #98.

@dependabot dependabot Bot closed this May 9, 2026
@dependabot dependabot Bot deleted the dependabot/npm_and_yarn/hono-4.12.16 branch May 9, 2026 07:05
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file javascript Pull requests that update javascript code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants